{"title":"A Post-Quantum One Time Signature Using Bloom Filter","authors":"Masoumeh Shafieinejad, R. Safavi-Naini","doi":"10.1109/PST.2017.00056","DOIUrl":"https://doi.org/10.1109/PST.2017.00056","url":null,"abstract":"Today's commonly used digital signatures will not be secure if a quantum computer exists. One time signatures (OTS) base security on the one way property of hash functions and will stay secure against an adversary with access to a quantum computer. These schemes however suffer from large public and private keys, as well as large signature size. We propose an OTS that uses Bloom filters to enhance the efficiency without sacrificing security, and show the required sizes of public/private keys, as well as the signature size will all reduce for the same security level.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Segmentation Method for Integrated ICS (Short Paper)","authors":"Khaoula Es-Salhi, D. Espès, N. Cuppens-Boulahia","doi":"10.1109/PST.2017.00020","DOIUrl":"https://doi.org/10.1109/PST.2017.00020","url":null,"abstract":"The paper presents a new segmentation method for Integrated ICS (Industrial Control Systems) with Corporate system. This new method aims at simplifying security zones identification by focusing only on the system's aspects that are really relevant for segmentation taking into account the system's constraints. Multiple research works have studied IICS (Integrated ICS) segmentation but their solutions are unfortunately not generic enough and do not sufficiently take into account all of the Integrated ICS specificity. Our new method tries to address the problem more efficiently by providing realistic and pragmatic answers to the issue while remaining sufficiently generic to be applied to different types of Integrated ICS.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121813601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimized Secure Data Aggregation in Wireless Sensor Networks","authors":"Scott A. Thompson, B. Samanthula","doi":"10.1109/PST.2017.00055","DOIUrl":"https://doi.org/10.1109/PST.2017.00055","url":null,"abstract":"With continuing developments in miniaturization and battery design, wireless sensor networks (WSNs) are poised to become common technology in our daily lives. Low cost and flexibility of deployment make WSNs well suited for a wide variety of military, environmental, healthcare, and commercial applications. Some WSN applications, such as monitoring patients in hospitals or weapons targeting in battlefront require endto- end data confidentiality. However, since WSNs are made up of many resource limited sensor nodes, they are typically unable to sustain the high volumes of data transmissions. Using innetwork data aggregation, sensor data from multiple nodes can be combined before being forwarded to neighboring nodes; and thus, energy consumption can be reduced significantly. But in situations where sensor nodes privacy is non-negotiable, data aggregation cannot be implemented at the cost of security. Therefore, there is a strong need for secure data aggregation (SDA) protocols designed to fit the unique properties and considerable constraints of WSNs. Existing end-to-end solutions are either insecure or impractical. In this paper, we propose a novel solution for the secure aggregation of data in WSNs based on probabilistic homomorphic encryption. By combining with a unique encoding function, our solution guarantees the privacy of sensor data, while also greatly reducing communication costs.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126113071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information-Flow Control with Fading Labels","authors":"A. Bedford","doi":"10.1109/PST.2017.00053","DOIUrl":"https://doi.org/10.1109/PST.2017.00053","url":null,"abstract":"Information-flow control mechanisms generally invest the same amount of resources to protect information of varying importance. In this paper, we introduce the concept of fading labels. Fading labels are security labels that stop propagating their taint after a fixed amount of uses. Their use allows mechanisms to spend more resources on more important information.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database","authors":"Meiqi He, Jun Zhang, Gongxian Zeng, S. Yiu","doi":"10.1109/PST.2017.00042","DOIUrl":"https://doi.org/10.1109/PST.2017.00042","url":null,"abstract":"Searching encrypted database is an important topic as more users want to leverage a third-party cloud system to store and process their data in encrypted form. Despite a lot of wonderful results, there are still a number of unsolved problems. In particular, the problems of pattern matching (not keyword search), e.g. with wildcards, that supports secure boolean queries and how to determine the value of k automatically of a top-k search for different queries on encrypted data are not properly addressed. In this paper, we provide solutions to solve these problems. Also, most existing secure databases employ different encryption functions to support different operators. The only exception is SDB (SIGMOD'2014) that was designed to support data interoperability between integers with a unified encryption scheme so that sophisticated queries can be answered by the database. However, SDB does not support string matching queries. We show that our solutions can be made compatible with SDB to fill this gap. To the best of our knowledge, we are the first to investigate these problems. We prove that our scheme is secure against chosen query attack. We have evaluated the performance of our scheme on large (105 strings) real-world datasets, and showed that our scheme can achieve a high search quality of 99.9% recall and 98.6% accuracy with reasonable response time.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131895514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-National Privacy Concerns on Data Collection by Government Agencies (Short Paper)","authors":"R. Cooper, Hala Assal, S. Chiasson","doi":"10.1109/PST.2017.00030","DOIUrl":"https://doi.org/10.1109/PST.2017.00030","url":null,"abstract":"We conducted an online survey with 366 participants from Canada, India, the UK, and the US to compare privacy concerns and opinions about the collection of personal data by law enforcement and government agencies. We investigated what data participants were willing to share, in what circumstances participants were willing to allow data collection, what procedures companies should follow when they receive requests for customer information, and participants' general concern about their privacy. Statistical analysis showed that nationality and gender had significant impacts on participants' trust and perceptions of their governments, while nationality also impacted participants' willingness to share data under various circumstances. While participants were, on the whole, moderately amendable to data collection by government agencies given a court-ordered warrant, they also indicated a strong desire for increased transparency, and reported a lacklustre knowledge about privacy legislation.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper)","authors":"L. Garms, K. Martin, S. Ng","doi":"10.1109/PST.2017.00044","DOIUrl":"https://doi.org/10.1109/PST.2017.00044","url":null,"abstract":"Pervasive Social Networks of Strangers are available constantly, connecting users directly with no preexisting relationships. Such networks demand a high level of privacy, as users should be anonymous and their behaviour unlinkable. However, the anonymity of users could lead to abusive messages, spam, or fraud. A possible solution is to keep track of users' reputations, based on feedback from other users. However, the need to collate feedback on user behaviour to form reputations is at odds with the need for privacy. Anonymous and unlinkable feedback is also required, whilst multiple feedbacks given on the same item should be detected. To resolve this, we use group signatures and direct anonymous attestation, to give a reputation-based messaging scheme.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Squicciarini, Andrea Novelli, D. Lin, Cornelia Caragea, Haoti Zhong
{"title":"From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing","authors":"A. Squicciarini, Andrea Novelli, D. Lin, Cornelia Caragea, Haoti Zhong","doi":"10.1109/PST.2017.00047","DOIUrl":"https://doi.org/10.1109/PST.2017.00047","url":null,"abstract":"Sharing images on social network sites has become a part of daily routine for more and more online users. However, in face of the considerable amount of images shared online, it is not a trivial task for a person to manually configure proper privacy settings for each of the images that he/she uploaded. The lack of proper privacy protection during image sharing could raise many potential privacy breaches of people's private lives that they are not aware of. In this work, we propose a privacy setting recommender system to help people effortlessly set up the privacy settings for their online images. The key idea is developed based on our finding that there are certain correlations between a number of generic patterns of image privacy settings and image tags, regardless of the image owners' individual privacy bias and levels of awareness. We propose a multi-pronged mechanism that carefully analyzes tags' semantics and co-presence to derive a set of suitable privacy settings for a newly uploaded image. Our system is also capable of dealing with cold-start problem when there are very few image tags available. We have conducted extensive experimental studies and the results demonstrate the effectiveness of our approach in terms of the policy recommendation accuracy.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133881879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Altawy, Muhammad H. ElSheikh, A. Youssef, G. Gong
{"title":"Lelantos: A Blockchain-Based Anonymous Physical Delivery System","authors":"R. Altawy, Muhammad H. ElSheikh, A. Youssef, G. Gong","doi":"10.1109/PST.2017.00013","DOIUrl":"https://doi.org/10.1109/PST.2017.00013","url":null,"abstract":"Real world physical shopping offers customers the privilege of maintaining their privacy by giving them the option of using cash, and thus providing no personal information such as their names and home addresses. On the contrary, electronic shopping mandates the use of all sorts of personally identifiable information for both billing and shipping purposes. Cryptocurrencies such as Bitcoin have created a stimulated growth in private billing by enabling pseudonymous payments. However, the anonymous delivery of the purchased physical goods is still an open research problem. In this work, we present a blockchain-based physical delivery system called Lelantos1 that within a realistic threat model, offers customer anonymity, fair exchange and merchant-customer unlinkability. Our system is inspired by the onion routing techniques which are used to achieve anonymous message delivery. Additionally, Lelantos relies on the decentralization and pseudonymity of the blockchain to enable pseudonymity that is hard to compromise, and the distributed consensus mechanisms provided by smart contracts to enforce fair irrefutable transactions between distrustful contractual parties.","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124103589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Ligier, Sergiu Carpov, C. Fontaine, Renaud Sirdey
{"title":"Information Leakage Analysis of Inner-Product Functional Encryption Based Data Classification","authors":"D. Ligier, Sergiu Carpov, C. Fontaine, Renaud Sirdey","doi":"10.1109/PST.2017.00043","DOIUrl":"https://doi.org/10.1109/PST.2017.00043","url":null,"abstract":"In this work, we study the practical security of innerproduct functional encryption. We left behind the mathematical security proof of the schemes, provided in the literature, and focus on what attackers can use in realistic scenarios without tricking the protocol, and how they can retrieve more than they should be able to. This study is based on the proposed protocol from [1]. We generalize the scenario to an attacker possessing n secret keys. We propose attacks based on machine learning, and experiment them over the MNIST dataset [2].","PeriodicalId":405887,"journal":{"name":"2017 15th Annual Conference on Privacy, Security and Trust (PST)","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115871159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}